메뉴 건너뛰기




Volumn 1438, Issue , 1998, Pages 48-57

Covert distributed computing using java through web spoofing

Author keywords

[No Author keywords available]

Indexed keywords

DISTRIBUTED COMPUTER SYSTEMS; SECURITY OF DATA; WEBSITES;

EID: 48249105616     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/bfb0053720     Document Type: Conference Paper
Times cited : (2)

References (11)
  • 1
    • 33846063041 scopus 로고
    • Covert Distributed Processing With Computer Viruses
    • Springer-Verlag
    • S. R. White. Covert Distributed Processing With Computer Viruses. In Advances in Cryptology -- Crypto '89 Proceedings, pages 616-619, Springer-Verlag, 1990.
    • (1990) Advances in Cryptology -- Crypto '89 Proceedings , pp. 616-619
    • White, S.R.1
  • 2
    • 84956855977 scopus 로고    scopus 로고
    • valid at 9 Feb
    • Sun Microsystems. The Java TM Language: An Overview. See http://java,sun.com/docs/overviews/java/java-overview-1.html [URL valid at 9 Feb. 1998].
    • (1998) The Java TM Language: An Overview
  • 3
    • 58149365227 scopus 로고
    • Network Security, December, See also, valid at 20 Apr
    • Frederick B. Cohen. Internet holes: 50 ways to attack your web systems. Network Security, December 1995. See also http://all.net/journal/netsec/9512.html [URL valid at 20 Apr. 1998]
    • (1995) Internet Holes: 50 Ways to Attack Your Web Systems
    • Cohen, F.B.1
  • 4
    • 0029709794 scopus 로고    scopus 로고
    • A Note on Distributed Coordinated Attacks
    • Frederick B. Cohen. A Note on Distributed Coordinated Attacks. Computers & Security, 15:103-121, 1996.
    • (1996) Computers & Security , vol.15 , pp. 103-121
    • Cohen, F.B.1
  • 5
    • 0029697575 scopus 로고    scopus 로고
    • Java Security: From Hot Java to Netscape and Beyond
    • See also, valid at 9 Feb
    • Edward W. Felten, Drew Dean and Dan S. Wallach. Java Security: From Hot Java to Netscape and Beyond. In IEEE Symposium on Security and Privacy, 1996. See also http://www.cs.princeton.edu/sip/pub/secure96.html [URL valid at 9 Feb. 1998]
    • (1996) IEEE Symposium on Security and Privacy
    • Felten, E.W.1    Dean, D.2    Wallach, D.S.3
  • 6
    • 0011192576 scopus 로고    scopus 로고
    • Web spoofing: An Internet Con Game
    • Princeton University, In 20th National Information Systems Security Conference (Baltimore, Maryland), October, 1997. See also, valid at 9 Feb. 1998]
    • Drew Dean, Edward W. Felten, Dirk Balfanz and Dan S. Wallach. Web spoofing: An Internet Con Game. Technical report 540-96, Department of Computer Science, Princeton University, 1997. In 20th National Information Systems Security Conference (Baltimore, Maryland), October, 1997. See also http://www.cs.princeton.edu/sip/pub/spoofing.html [URL valid at 9 Feb. 1998]
    • (1997) Technical Report 540-96, Department of Computer Science
    • Dean, D.1    Felten, E.W.2    Balfanz, D.3    Wallach, D.S.4
  • 8
    • 84955587328 scopus 로고    scopus 로고
    • See, valid at 12 Feb
    • M. D. LaDue. Hostile Applets on the Horizon. See htttp://www.rstcorp.com/hostile-applets/HostileArticle.html [URL valid at 12 Feb. 1998].
    • (1998) Hostile Applets on the Horizon
    • Ladue, M.D.1
  • 9
    • 84956857777 scopus 로고    scopus 로고
    • valid at 9 Feb
    • RFC 1945 "Hypertext Transfer Protocol -- HTTP/1.0". See http://www.w3.org/Proltocols/rfcl945/rfcl945 [URL valid at 9 Feb. 1998].
    • (1998) Hypertext Transfer Protocol -- HTTP/1.0
  • 10
    • 84937689586 scopus 로고    scopus 로고
    • Hypertext Transfer Protocol -- HTTP/1.1
    • valid at 9 Feb
    • RFC 2068 "Hypertext Transfer Protocol -- HTTP/1.1". See http://www.w3.org/Protocols/rfc2068/rfc2068 [URL valid at 9 Feb. 1998].
    • (1998)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.